Searched refs:secure_boot_v1 (Results 1 – 7 of 7) sorted by relevance
199 bool secure_boot_v1 = esp_efuse_read_field_bit(ESP_EFUSE_ABS_DONE_0); in esp_secure_boot_cfg_verify_release_mode() local202 result = secure_boot_v1 || secure_boot_v2; in esp_secure_boot_cfg_verify_release_mode()203 if (secure_boot_v1 && secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()206 } else if (!secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()214 if (secure_boot_v1 && !secure_boot_v2) { in esp_secure_boot_cfg_verify_release_mode()
29 …BLOCK2 (secure_boot_v1 s) [2 ] regs_to_write: 001f8000 00000000 00000000 00000000 0000000…53 …BLOCK2 (secure_boot_v1 s) [2 ] regs_to_write: 001f8000 00000000 00000000 00000000 0000000…
42 …BLOCK2 (secure_boot_v1 s) [2 ] read_regs: 00000000 00000000 00000000 00000000 00000000 00…
47 …* Secure boot key. Use ``secure_boot_v1`` or ``secure_boot_v2`` as block name. The key is placed i…50 …Keys for ``flash_encryption`` and ``secure_boot_v1`` will be burned as read and write protected. T…149 espefuse.py burn_key secure_boot_v1 secure_boot_key_v1.bin
65 list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_bootloader.c")68 list(APPEND srcs "src/secure_boot_v1/secure_boot.c"81 list(APPEND srcs "src/secure_boot_v1/secure_boot_signatures_app.c")
186 "\t${espefusepy} burn_key secure_boot_v1 ${secure_bootloader_key}"
1794 secure_boot_v1 {IMAGES_DIR}/256bit_1 --no-protect-key"1807 secure_boot_v1 {IMAGES_DIR}/256bit_1"